Which security methodology does this represent?

You plan to implement a security strategy and place multiple layers of defense throughout a network infrastructure.

Which security methodology does this represent?
A . threat modeling
B . identity as the security perimeter
C . defense in depth
D . the shared responsibility model

Answer: C

Explanation:

Reference: https://docs.microsoft.com/en-us/learn/modules/secure-network-connectivity-azure/2-what-is-defense-in-depth

Latest SC-900 Dumps Valid Version with 46 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments